EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 5

A Study on Security and Privacy Issues of Cloud Eco-System

journal image
 Download
1092
  • Manu A. R and V. K Agrawal and K N Bala Subramanya Murthy 2013. A Study on Security and Privacy Issues of Cloud Eco-System. International Journal of Applied Information Systems. 5, 5 (April 2013), 28-37. DOI=http://dx.doi.org/10.5120/ijais450931
  • @article{10.5120/ijais2017451568,
    author = {Manu A. R and V. K Agrawal and K N Bala Subramanya Murthy},
    title = {A Study on Security and Privacy Issues of Cloud Eco-System},
    journal = {International Journal of Applied Information Systems},
    issue_date = {April 2013},
    volume = {5},
    number = {},
    month = {April},
    year = {2013},
    issn = {},
    pages = {28-37},
    numpages = {},
    url = {/archives/volume5/number5/452-0931},
    doi = { 10.5120/ijais13-450931},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450931
    %A Manu A.  R
    %A V.  K Agrawal
    %A K N Bala Subramanya Murthy
    %T A Study on Security and Privacy Issues of Cloud Eco-System
    %J International Journal of Applied Information Systems
    %@ 
    %V 5
    %N 
    %P 28-37
    %D 2013
    %I  xA9 2012 by IJAIS Journal
    

Abstract

Cloud computing is an Internet-based model for enabling appropriate on - demand network gateway to the pooled setup of computing resources and related infrastructure on sharing basis. Cloud computing offers four broad categories of services namely, IaaS, PaaS, DSaaS and SaaS. In these cloud services, individuals and organizations usually face security, privacy and trust challenges. Most of the R & D centers and researchers across the world are working towards resolving these security issues and achieving the trust among each other. In this paper we present a framework for unified security design which may help to resolve privacy, trust and security challenges that are faced in cloud- based networks. We also expect that this would help us to understand existing security challenges, while trying to achieve common standards for secure cloud services, design secure cloud transmission protocol, and devise an algorithm in this regard.

References

  1. National Institute of Standards & Technology, Definition and standards, on cloud computing.
  2. N. Sarat Chandra Babu, "Cloud Security", CSI. Proceedings of the international conference on advances in cloud computing, ACC-2012, July 26-28.
  3. Security Guidance for Critical Areas of Focus in Cloud Computing - CSA.
  4. Whitehall drives open standards compliance regime
  5. David Bicknell Published 01 November 2012.
  6. "The-Emergence-of-As-A-Service-Offerings-That-Are-Not-Cloud-Services", Business & Technology Sourcing Review - Issue 18, 19 Dec 2012.
  7. White paper "The Seven Standards of Cloud Computing Service Delivery" - Salesforce
  8. Dinesha H A, V. K Agrawal "Framework Design of Secure Cloud Transmission Protocol", IJCSI, Vol. 10, Issue 1, No 1, January 2013
  9. Government of Saskatchewan Reference document – Plan and annual Report, Comprehensive guidelines
  10. CONCURRENT JURISDICTION PLANNING, GUIDELINES,AND APPLICATION - MICHIGAN SUPREME COURT, State Court Administrative Office
  11. N. Sarat Chandra Babu, Cloud Computing Overview National Workshop on Cloud Computing, 21st May 2011 C-DAC, KP, Bengaluru
  12. Slidesharenet "Cloud computing vision and strategy feb -2010, GSA draft.
  13. Scribd- doc-48631944-1-Cloud-Computing.
  14. Principles of practices of information security – Michael E. Whitman, Herbert J. Mattord. Cengage learing, India edition.
  15. "Planning Guide Cloud Security", Seven Steps for Building Security in the Cloud from the Ground Up, Intel
  16. Planning for Security – VTU elearning Dr. Nalini N. Prof. & Head, Dept of CSE,NMIT,Bangalore
  17. HTTP: Communication Technology Proceedings-2003. ICCT 2003. International Conference on Study on conformance testing of hypertext transfer protocol by Xiaoli Yu; Jianping Wu; Xia Yin; Dept. of Computer. Sci. , Tsinghua Univ. , Beijing, China.
  18. Microsoft -licensing-options and enrollments.
  19. Security Challenges with Virtualization – Thesis by Hans Peter Reiser
  20. Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni, "Cloud Security Is Not (Just) Virtualization Security", CSE-PSU, IBM T. J. Watson Research
  21. "Security in Inter Cloud",
  22. Wikipedia – "Cloud_computing_security".
  23. Ibm developer works-websphere-techjourna--0904_amrhein.

Keywords

Cloud Computing, Challenges, Security and Privacy Issues

Index Terms

Computer Science
Information Sciences